AskOverflow.Dev

AskOverflow.Dev Logo AskOverflow.Dev Logo

AskOverflow.Dev Navigation

  • Início
  • system&network
  • Ubuntu
  • Unix
  • DBA
  • Computer
  • Coding
  • LangChain

Mobile menu

Close
  • Início
  • system&network
    • Recentes
    • Highest score
    • tags
  • Ubuntu
    • Recentes
    • Highest score
    • tags
  • Unix
    • Recentes
    • tags
  • DBA
    • Recentes
    • tags
  • Computer
    • Recentes
    • tags
  • Coding
    • Recentes
    • tags
Início / unix / Perguntas / 687388
Accepted
sebelk
sebelk
Asked: 2022-01-22 14:10:42 +0800 CST2022-01-22 14:10:42 +0800 CST 2022-01-22 14:10:42 +0800 CST

Por que o notificador de atualização diz algo diferente que atualizações autônomas?

  • 772

Eu tenho um motd "mensagem do dia" quando faço login que parece vir do arquivo /var/lib/update-notifier/updates-available:

root@ls:~# cat /var/lib/update-notifier/updates-available

95 updates can be applied immediately.
1 of these updates is a standard security update.
To see these additional updates run: apt list --upgradable

No entanto, quando executo atualizações autônomas, ele diz que não há atualizações de segurança disponíveis:

root@ls:~# unattended-upgrades --dry-run -v
Initial blacklisted packages: 
Initial whitelisted packages: 
Starting unattended upgrades script
Allowed origins are: o=Ubuntu,a=bionic, o=Ubuntu,a=bionic-security, o=UbuntuESM,a=bionic
No packages found that can be upgraded unattended and no pending auto-removals

Apenas no caso, este meu arquivo sources.list:

deb http://archive.ubuntu.com/ubuntu bionic main restricted
deb http://archive.ubuntu.com/ubuntu bionic-updates main restricted
deb http://archive.ubuntu.com/ubuntu bionic universe
deb http://archive.ubuntu.com/ubuntu bionic-updates universe
deb http://archive.ubuntu.com/ubuntu bionic multiverse
deb http://archive.ubuntu.com/ubuntu bionic-updates multiverse
deb http://archive.ubuntu.com/ubuntu bionic-backports main restricted universe multiverse
deb http://archive.ubuntu.com/ubuntu bionic-security main restricted
deb http://archive.ubuntu.com/ubuntu bionic-security universe
deb http://archive.ubuntu.com/ubuntu bionic-security multiverse

EDIT 1 : Saída da lista apt atualizável

Listing... Done
apt/bionic-updates 1.6.14 amd64 [upgradable from: 1.6.12ubuntu0.2]
apt-utils/bionic-updates 1.6.14 amd64 [upgradable from: 1.6.12ubuntu0.2]
base-files/bionic-updates 10.1ubuntu2.11 amd64 [upgradable from: 10.1ubuntu2.8]
bcache-tools/bionic-updates 1.0.8-2ubuntu0.18.04.1 amd64 [upgradable from: 1.0.8-2build1]
cloud-init/bionic-updates 21.4-0ubuntu1~18.04.1 all [upgradable from: 19.4-33-gbb4131a2-0ubuntu1~18.04.1]
cryptsetup/bionic-updates 2:2.0.2-1ubuntu1.2 amd64 [upgradable from: 2:2.0.2-1ubuntu1.1]
cryptsetup-bin/bionic-updates 2:2.0.2-1ubuntu1.2 amd64 [upgradable from: 2:2.0.2-1ubuntu1.1]
dirmngr/bionic-updates 2.2.4-1ubuntu1.4 amd64 [upgradable from: 2.2.4-1ubuntu1.3]
dmeventd/bionic-updates 2:1.02.145-4.1ubuntu3.18.04.3 amd64 [upgradable from: 2:1.02.145-4.1ubuntu3.18.04.2]
dmsetup/bionic-updates 2:1.02.145-4.1ubuntu3.18.04.3 amd64 [upgradable from: 2:1.02.145-4.1ubuntu3.18.04.2]
dnsmasq-base/bionic-updates 2.79-1ubuntu0.5 amd64 [upgradable from: 2.79-1ubuntu0.4]
friendly-recovery/bionic-updates 0.2.38ubuntu1.2 all [upgradable from: 0.2.38ubuntu1.1]
gnupg/bionic-updates 2.2.4-1ubuntu1.4 amd64 [upgradable from: 2.2.4-1ubuntu1.3]
gnupg-l10n/bionic-updates 2.2.4-1ubuntu1.4 all [upgradable from: 2.2.4-1ubuntu1.3]
gnupg-utils/bionic-updates 2.2.4-1ubuntu1.4 amd64 [upgradable from: 2.2.4-1ubuntu1.3]
gpg/bionic-updates 2.2.4-1ubuntu1.4 amd64 [upgradable from: 2.2.4-1ubuntu1.3]
gpg-agent/bionic-updates 2.2.4-1ubuntu1.4 amd64 [upgradable from: 2.2.4-1ubuntu1.3]
gpg-wks-client/bionic-updates 2.2.4-1ubuntu1.4 amd64 [upgradable from: 2.2.4-1ubuntu1.3]
gpg-wks-server/bionic-updates 2.2.4-1ubuntu1.4 amd64 [upgradable from: 2.2.4-1ubuntu1.3]
gpgconf/bionic-updates 2.2.4-1ubuntu1.4 amd64 [upgradable from: 2.2.4-1ubuntu1.3]
gpgsm/bionic-updates 2.2.4-1ubuntu1.4 amd64 [upgradable from: 2.2.4-1ubuntu1.3]
gpgv/bionic-updates 2.2.4-1ubuntu1.4 amd64 [upgradable from: 2.2.4-1ubuntu1.3]
gzip/bionic-updates 1.6-5ubuntu1.1 amd64 [upgradable from: 1.6-5ubuntu1]
initramfs-tools/bionic-updates 0.130ubuntu3.13 all [upgradable from: 0.130ubuntu3.9]
initramfs-tools-bin/bionic-updates 0.130ubuntu3.13 amd64 [upgradable from: 0.130ubuntu3.9]
initramfs-tools-core/bionic-updates 0.130ubuntu3.13 all [upgradable from: 0.130ubuntu3.9]
iproute2/bionic-updates 4.15.0-2ubuntu1.3 amd64 [upgradable from: 4.15.0-2ubuntu1.1]
kmod/bionic-updates 24-1ubuntu3.5 amd64 [upgradable from: 24-1ubuntu3.2]
landscape-common/bionic-updates 18.01-0ubuntu3.5 amd64 [upgradable from: 18.01-0ubuntu3.4]
libapt-inst2.0/bionic-updates 1.6.14 amd64 [upgradable from: 1.6.12ubuntu0.2]
libapt-pkg5.0/bionic-updates 1.6.14 amd64 [upgradable from: 1.6.12ubuntu0.2]
libaudit-common/bionic-updates 1:2.8.2-1ubuntu1.1 all [upgradable from: 1:2.8.2-1ubuntu1]
libaudit1/bionic-updates 1:2.8.2-1ubuntu1.1 amd64 [upgradable from: 1:2.8.2-1ubuntu1]
libc-bin/bionic-updates 2.27-3ubuntu1.4 amd64 [upgradable from: 2.27-3ubuntu1.2]
libc6/bionic-updates 2.27-3ubuntu1.4 amd64 [upgradable from: 2.27-3ubuntu1.2]
libcryptsetup12/bionic-updates 2:2.0.2-1ubuntu1.2 amd64 [upgradable from: 2:2.0.2-1ubuntu1.1]
libdevmapper-event1.02.1/bionic-updates 2:1.02.145-4.1ubuntu3.18.04.3 amd64 [upgradable from: 2:1.02.145-4.1ubuntu3.18.04.2]
libdevmapper1.02.1/bionic-updates 2:1.02.145-4.1ubuntu3.18.04.3 amd64 [upgradable from: 2:1.02.145-4.1ubuntu3.18.04.2]
libdrm-common/bionic-updates 2.4.101-2~18.04.1 all [upgradable from: 2.4.99-1ubuntu1~18.04.2]
libdrm2/bionic-updates 2.4.101-2~18.04.1 amd64 [upgradable from: 2.4.99-1ubuntu1~18.04.2]
libgnutls30/bionic-updates 3.5.18-1ubuntu1.5 amd64 [upgradable from: 3.5.18-1ubuntu1.3]
libkmod2/bionic-updates 24-1ubuntu3.5 amd64 [upgradable from: 24-1ubuntu3.2]
liblvm2app2.2/bionic-updates 2.02.176-4.1ubuntu3.18.04.3 amd64 [upgradable from: 2.02.176-4.1ubuntu3.18.04.2]
liblvm2cmd2.02/bionic-updates 2.02.176-4.1ubuntu3.18.04.3 amd64 [upgradable from: 2.02.176-4.1ubuntu3.18.04.2]
libnss-systemd/bionic-updates 237-3ubuntu10.53 amd64 [upgradable from: 237-3ubuntu10.50]
libpam-modules/bionic-updates 1.1.8-3.6ubuntu2.18.04.3 amd64 [upgradable from: 1.1.8-3.6ubuntu2.18.04.1]
libpam-modules-bin/bionic-updates 1.1.8-3.6ubuntu2.18.04.3 amd64 [upgradable from: 1.1.8-3.6ubuntu2.18.04.1]
libpam-runtime/bionic-updates 1.1.8-3.6ubuntu2.18.04.3 all [upgradable from: 1.1.8-3.6ubuntu2.18.04.1]
libpam-systemd/bionic-updates 237-3ubuntu10.53 amd64 [upgradable from: 237-3ubuntu10.50]
libpam0g/bionic-updates 1.1.8-3.6ubuntu2.18.04.3 amd64 [upgradable from: 1.1.8-3.6ubuntu2.18.04.1]
libpcap0.8/bionic-updates 1.8.1-6ubuntu1.18.04.2 amd64 [upgradable from: 1.8.1-6ubuntu1.18.04.1]
libssl1.1/bionic-updates 1.1.1-1ubuntu2.1~18.04.14 amd64 [upgradable from: 1.1.1-1ubuntu2.1~18.04.13]
libsystemd0/bionic-updates 237-3ubuntu10.53 amd64 [upgradable from: 237-3ubuntu10.50]
libudev1/bionic-updates 237-3ubuntu10.53 amd64 [upgradable from: 237-3ubuntu10.50]
libxau6/bionic-updates 1:1.0.8-1ubuntu1 amd64 [upgradable from: 1:1.0.8-1]
linux-base/bionic-updates 4.5ubuntu1.7 all [upgradable from: 4.5ubuntu1.2]
linux-firmware/bionic-updates 1.173.20 all [upgradable from: 1.173.18]
locales/bionic-updates 2.27-3ubuntu1.4 all [upgradable from: 2.27-3ubuntu1.2]
lshw/bionic-updates 02.18-0.1ubuntu6.18.04.2 amd64 [upgradable from: 02.18-0.1ubuntu6.18.04.1]
lvm2/bionic-updates 2.02.176-4.1ubuntu3.18.04.3 amd64 [upgradable from: 2.02.176-4.1ubuntu3.18.04.2]
lxcfs/bionic-updates 3.0.3-0ubuntu1~18.04.2 amd64 [upgradable from: 3.0.3-0ubuntu1~18.04.1]
multiarch-support/bionic-updates 2.27-3ubuntu1.4 amd64 [upgradable from: 2.27-3ubuntu1.2]
netplan.io/bionic-updates 0.99-0ubuntu3~18.04.5 amd64 [upgradable from: 0.98-0ubuntu1~18.04.1]
nplan/bionic-updates 0.99-0ubuntu3~18.04.5 all [upgradable from: 0.98-0ubuntu1~18.04.1]
open-iscsi/bionic-updates 2.0.874-5ubuntu2.10 amd64 [upgradable from: 2.0.874-5ubuntu2.7]
open-vm-tools/bionic-updates 2:11.0.5-4ubuntu0.18.04.1 amd64 [upgradable from: 2:11.0.1-2ubuntu0.18.04.2]
openssl/bionic-updates 1.1.1-1ubuntu2.1~18.04.14 amd64 [upgradable from: 1.1.1-1ubuntu2.1~18.04.13]
pollinate/bionic-updates 4.33-0ubuntu1~18.04.2 all [upgradable from: 4.33-0ubuntu1~18.04.1]
python-apt-common/bionic-updates 1.6.5ubuntu0.7 all [upgradable from: 1.6.5ubuntu0.5]
python3-apt/bionic-updates 1.6.5ubuntu0.7 amd64 [upgradable from: 1.6.5ubuntu0.5]
python3-distupgrade/bionic-updates 1:18.04.45 all [upgradable from: 1:18.04.37]
python3-httplib2/bionic-updates 0.9.2+dfsg-1ubuntu0.3 all [upgradable from: 0.9.2+dfsg-1ubuntu0.2]
python3-software-properties/bionic-updates 0.96.24.32.18 all [upgradable from: 0.96.24.32.14]
python3-update-manager/bionic-updates 1:18.04.11.13 all [upgradable from: 1:18.04.11.10]
rsync/bionic-updates 3.1.2-2.1ubuntu1.2 amd64 [upgradable from: 3.1.2-2.1ubuntu1.1]
snapd/bionic-updates 2.51.1+18.04 amd64 [upgradable from: 2.48.3+18.04]
software-properties-common/bionic-updates 0.96.24.32.18 all [upgradable from: 0.96.24.32.14]
sosreport/bionic-updates 4.1-1ubuntu0.18.04.3 amd64 [upgradable from: 3.6-1ubuntu0.18.04.4]
systemd/bionic-updates 237-3ubuntu10.53 amd64 [upgradable from: 237-3ubuntu10.50]
systemd-sysv/bionic-updates 237-3ubuntu10.53 amd64 [upgradable from: 237-3ubuntu10.50]
ubuntu-advantage-tools/bionic-updates 27.5~18.04.1 all [upgradable from: 17]
ubuntu-keyring/bionic-updates 2018.09.18.1~18.04.2 all [upgradable from: 2018.09.18.1~18.04.0]
ubuntu-minimal/bionic-updates 1.417.5 amd64 [upgradable from: 1.417.4]
ubuntu-release-upgrader-core/bionic-updates 1:18.04.45 all [upgradable from: 1:18.04.37]
ubuntu-server/bionic-updates 1.417.5 amd64 [upgradable from: 1.417.4]
ubuntu-standard/bionic-updates 1.417.5 amd64 [upgradable from: 1.417.4]
udev/bionic-updates 237-3ubuntu10.53 amd64 [upgradable from: 237-3ubuntu10.50]
ufw/bionic-updates 0.36-0ubuntu0.18.04.2 all [upgradable from: 0.36-0ubuntu0.18.04.1]
unattended-upgrades/bionic-updates 1.1ubuntu1.18.04.14 all [upgradable from: 1.1ubuntu1.18.04.13]
update-manager-core/bionic-updates 1:18.04.11.13 all [upgradable from: 1:18.04.11.10]

Então, quem está dizendo a verdade, update-notifier-common ou unattended-upgrades? EDIT 2 : E eu me pergunto onde "1 dessas atualizações é uma atualização de segurança padrão". vem de onde? Como posso obter os nomes dos pacotes de tais atualizações?

Não recebo nada se executar: apt-get upgrade -s | grep ^Inst | grep -i security

ubuntu apt
  • 1 1 respostas
  • 365 Views

1 respostas

  • Voted
  1. Best Answer
    sebelk
    2022-01-23T06:55:39+08:002022-01-23T06:55:39+08:00

    A diferença vem de atualizações autônomas que dependem de 'upgrade' ( Como obter uma lista de todas as atualizações de segurança pendentes? ), mas updates-notifier ele faz em 'dist-upgrade'.

    Pode ser verificado executando:

    apt-get --dry-run  upgrade -V | grep ^[0-9]
    85 upgraded, 0 newly installed, 0 to remove and 5 not upgraded.
    
    apt-get --dry-run  upgrade -V | grep "^Inst.*security.*$"  | wc -l
    0
    
    apt-get --dry-run  dist-upgrade -V | grep ^[0-9]
    90 upgraded, 5 newly installed, 0 to remove and 0 not upgraded.
    

    Então, 90 + 5 = 95

    E "1 dessas atualizações é uma atualização de segurança padrão". vem de onde:

    apt-get --dry-run  dist-upgrade -V | grep "^Inst.*security.*$"  
    Inst distro-info (0.18ubuntu0.18.04.1 Ubuntu:18.04/bionic-updates, Ubuntu:18.04/bionic-security [amd64])
    
    • 2

relate perguntas

  • Qual é o benefício de /etc/apt/sources.list.d sobre /etc/apt/sources.list

  • traçar gráfico 2D com pontos de um arquivo

  • Como faço para verificar se estou usando 9.9.9.9 para DNS?

  • Instale várias distribuições Linux em paralelo

  • O OpenVPN auto-compilado não inicia a partir do systemd

Sidebar

Stats

  • Perguntas 205573
  • respostas 270741
  • best respostas 135370
  • utilizador 68524
  • Highest score
  • respostas
  • Marko Smith

    Possível firmware ausente /lib/firmware/i915/* para o módulo i915

    • 3 respostas
  • Marko Smith

    Falha ao buscar o repositório de backports jessie

    • 4 respostas
  • Marko Smith

    Como exportar uma chave privada GPG e uma chave pública para um arquivo

    • 4 respostas
  • Marko Smith

    Como podemos executar um comando armazenado em uma variável?

    • 5 respostas
  • Marko Smith

    Como configurar o systemd-resolved e o systemd-networkd para usar o servidor DNS local para resolver domínios locais e o servidor DNS remoto para domínios remotos?

    • 3 respostas
  • Marko Smith

    apt-get update error no Kali Linux após a atualização do dist [duplicado]

    • 2 respostas
  • Marko Smith

    Como ver as últimas linhas x do log de serviço systemctl

    • 5 respostas
  • Marko Smith

    Nano - pule para o final do arquivo

    • 8 respostas
  • Marko Smith

    erro grub: você precisa carregar o kernel primeiro

    • 4 respostas
  • Marko Smith

    Como baixar o pacote não instalá-lo com o comando apt-get?

    • 7 respostas
  • Martin Hope
    user12345 Falha ao buscar o repositório de backports jessie 2019-03-27 04:39:28 +0800 CST
  • Martin Hope
    Carl Por que a maioria dos exemplos do systemd contém WantedBy=multi-user.target? 2019-03-15 11:49:25 +0800 CST
  • Martin Hope
    rocky Como exportar uma chave privada GPG e uma chave pública para um arquivo 2018-11-16 05:36:15 +0800 CST
  • Martin Hope
    Evan Carroll status systemctl mostra: "Estado: degradado" 2018-06-03 18:48:17 +0800 CST
  • Martin Hope
    Tim Como podemos executar um comando armazenado em uma variável? 2018-05-21 04:46:29 +0800 CST
  • Martin Hope
    Ankur S Por que /dev/null é um arquivo? Por que sua função não é implementada como um programa simples? 2018-04-17 07:28:04 +0800 CST
  • Martin Hope
    user3191334 Como ver as últimas linhas x do log de serviço systemctl 2018-02-07 00:14:16 +0800 CST
  • Martin Hope
    Marko Pacak Nano - pule para o final do arquivo 2018-02-01 01:53:03 +0800 CST
  • Martin Hope
    Kidburla Por que verdadeiro e falso são tão grandes? 2018-01-26 12:14:47 +0800 CST
  • Martin Hope
    Christos Baziotis Substitua a string em um arquivo de texto enorme (70 GB), uma linha 2017-12-30 06:58:33 +0800 CST

Hot tag

linux bash debian shell-script text-processing ubuntu centos shell awk ssh

Explore

  • Início
  • Perguntas
    • Recentes
    • Highest score
  • tag
  • help

Footer

AskOverflow.Dev

About Us

  • About Us
  • Contact Us

Legal Stuff

  • Privacy Policy

Language

  • Pt
  • Server
  • Unix

© 2023 AskOverflow.DEV All Rights Reserve